Comments on: Google commits privacy seppuku at BT’s request https://blog.al4.co.nz/2014/09/google-commits-privacy-seppuku-at-bts-request/ My hobby... Sun, 24 May 2015 19:50:17 +0000 hourly 1 https://wordpress.org/?v=6.9 By: chris https://blog.al4.co.nz/2014/09/google-commits-privacy-seppuku-at-bts-request/#comment-9199 Sun, 24 May 2015 19:50:17 +0000 http://blog.al4.co.nz/?p=1918#comment-9199 Still happening- eg; http://i.imgur.com/lMIrTPb.png

]]>
By: chris https://blog.al4.co.nz/2014/09/google-commits-privacy-seppuku-at-bts-request/#comment-9198 Sun, 24 May 2015 19:45:15 +0000 http://blog.al4.co.nz/?p=1918#comment-9198 Sad to see that BT and Google are still doing this.

]]>
By: Alex Forbes https://blog.al4.co.nz/2014/09/google-commits-privacy-seppuku-at-bts-request/#comment-4618 Tue, 25 Nov 2014 00:25:10 +0000 http://blog.al4.co.nz/?p=1918#comment-4618 In reply to PhistucK.

I somewhat agree, it’s been shown that BT is in fact intercepting and replying to DNS queries fraudulently, but Google is still facilitating this by providing a server address that intentionally disables SSL against the client’s wishes. So while the title is not as accurate as I thought, it makes a point which is still valid.

(sorry for delay, this got buried in the spam bin)

]]>
By: PhistucK https://blog.al4.co.nz/2014/09/google-commits-privacy-seppuku-at-bts-request/#comment-4457 Fri, 21 Nov 2014 21:13:10 +0000 http://blog.al4.co.nz/?p=1918#comment-4457 In reply to Alex Forbes.

I think it has been argued here in the comments that Google is not at fault, but BT is. If you add 216.239.32.20 http://www.google.co.uk (216.239.32.20 is the IP for nossl.google.com) to your HOSTS file and go to https://www.google.co.uk, it will redirect to http. This is intentional and not by request from BT, but due to BT returning modified DNS records.

Your title is now misleading…

]]>
By: Alex Forbes https://blog.al4.co.nz/2014/09/google-commits-privacy-seppuku-at-bts-request/#comment-4436 Fri, 21 Nov 2014 09:45:09 +0000 http://blog.al4.co.nz/?p=1918#comment-4436 In reply to Damion Yates.

Whoa, that means it’s every DNS request and not just those for Google, so the DNS server logs would be interesting of themselves.

Thanks for checking this out!

Also implies that if you did a lookup directly against your own DNS server rather than 8.8.8.8, the UDP packet would never reach it.

As a webmaster you could have fun with this, and easily redirect all users from BTWifi to a different site… which injected some JS and displayed a warning…. :-)

]]>
By: GOTCHA: Google caught STRIPPING SSL from BT Wi-Fi users’ searches | TechDiem.com https://blog.al4.co.nz/2014/09/google-commits-privacy-seppuku-at-bts-request/#comment-4429 Fri, 21 Nov 2014 05:27:43 +0000 http://blog.al4.co.nz/?p=1918#comment-4429 […] speculated in a blog detailing the SSL strip that BT may have removed the security measure to facilitate content […]

]]>
By: Bo Tian (@magicbotian) https://blog.al4.co.nz/2014/09/google-commits-privacy-seppuku-at-bts-request/#comment-4415 Thu, 20 Nov 2014 23:20:50 +0000 http://blog.al4.co.nz/?p=1918#comment-4415 In reply to Alex.

That feature was meant for schools to force safesearch, and is being abused by BT. It will be turned off http://googleonlinesecurity.blogspot.com/2014/10/an-update-to-safesearch-options-for.html

]]>
By: Damion Yates https://blog.al4.co.nz/2014/09/google-commits-privacy-seppuku-at-bts-request/#comment-4413 Thu, 20 Nov 2014 23:06:57 +0000 http://blog.al4.co.nz/?p=1918#comment-4413 In reply to Max Allan.

I run a DNS service which logs the server doing lookups. I then looked up unique hostnames on my domain to avoid caching. I did this whilst connected to the BT access point which I can see via wifi from my house and to my surprise everything came from BT even when I explicitly requested 8.8.8.8. The reason I’m surprised is because I’m fairly sure this is new as I’m sure they didn’t do this before.

However you now have your answer. They’re definitely doing dns interception and using that to direct to the nosslsearch host to force http. Possibly so users don’t get confusing error messages, but more likely for some financial gain related to ads or something.

]]>
By: Alex Forbes https://blog.al4.co.nz/2014/09/google-commits-privacy-seppuku-at-bts-request/#comment-4399 Thu, 20 Nov 2014 17:59:44 +0000 http://blog.al4.co.nz/?p=1918#comment-4399 In reply to Max Allan.

That would explain how I ended up using that IP. Not sure how I missed it though as it’s clearly sending the CNAME record… wish I’d noticed this!

(your comment ended up in the Akismet spam queue, sorry for the delay in approving)

]]>
By: ysthysth https://blog.al4.co.nz/2014/09/google-commits-privacy-seppuku-at-bts-request/#comment-4388 Thu, 20 Nov 2014 13:29:32 +0000 http://blog.al4.co.nz/?p=1918#comment-4388 In reply to Alex.

I wouldn’t be surprised if just putting an ssl-friendly IP for http://www.google.com isn’t enough; just looking at your curl output’s redirect to https://www.google.co.uk makes me suspect if you’d had *that* in your hosts file too, you wouldn’t have got the second redirect to http://

]]>